[144411] in cryptography@c2.net mail archive
Re: [tahoe-dev] SHA-1 broken!
daemon@ATHENA.MIT.EDU (Thomas Coppi)
Mon May 4 20:19:20 2009
In-Reply-To: <20090504003503.18873t0kb4xrk9ic@webmail.tugraz.at>
Date: Mon, 4 May 2009 18:05:52 -0600
From: Thomas Coppi <thisnukes4u@gmail.com>
To: Christian Rechberger <christian.rechberger@tugraz.at>
Cc: Cryptography <cryptography@metzdowd.com>
On Sun, May 3, 2009 at 4:35 PM, Christian Rechberger
<christian.rechberger@tugraz.at> wrote:
> The design of DES facilitates this kind of throughput/cost gains on FPGAs.
>
> Remember that the MD4 family (incl. SHA-1) was designed to be efficient on
> 32-bit CPUs. For these hash functions, it is much harder to get a
> throughput/cost gain on FPGAs compared to off-the-shelf CPUs. At least, this
> was my conclusion when I quickly looked into this a few years ago.
>
The NSA@Home project(http://nsa.unaligned.org/) seems to do it pretty well.
He even provides the optimized SHA-1 and MD5 Verilog code used. This only works
because straight-up bruteforce requires little memory, though. If the new
SHA-1 break requires significant memory usage I don't think something
like the COPACOBANA can help.
Regards,
--
Thomas Coppi
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com